Darktrace anuncia su intención de adquirir Cado Security.
Lea el comunicado de prensa
Plataforma
Productos
/NETWORK
Protección proactiva
/CORREO ELECTRÓNICO
Seguridad de IA nativa de la nube
/NUBE
Cobertura completa de la nube
/OT
Gestión integral de riesgos
/IDENTIDAD
Protección de usuario de 360°
/ENDPOINT
Cobertura para todos los dispositivos
/Gestión proactiva de la exposición
/Gestión de la superficie de ataque
/Preparación y recuperación ante incidentes
Analista de Cyber AI
Investiga cada alerta como un humano analista, a la velocidad y la escala de la IA
Servicios Darktrace
Maximice sus inversiones en seguridad con el soporte experto las 24 horas del día, los 7 días de la semana, y la gestión de incidentes de nuestro equipo global de SOC.
Centro de investigación de IA
Recursos
Clientes
Blog
Eventos
Dentro del SOC
La inferencia
Glosario
Todos los recursos
Libro blanco
Informe de amenazas semestral de 2024
Empresa
Carreras
Liderazgo
Noticias
Federal
Inversores
Academia
Jurídico
SDR Academy
Acerca de nosotros
Contactar
Socios
Visión general
Portal de socios
Socios tecnológicos
Integraciones
Socios destacados
Microsoft
AWS
Productos
Visión general
/NETWORK
Protección proactiva
/CORREO ELECTRÓNICO
Seguridad de IA nativa de la nube
/NUBE
Cobertura completa de la nube
/OT
Defienda los sistemas críticos
/IDENTIDAD
Protección de usuario de 360°
/ENDPOINT
Cobertura para todos los dispositivos
/Gestión proactiva de la exposición
/Gestión de la superficie de ataque
/Preparación y recuperación ante incidentes
Analista de Cyber AI
Servicios
Centro de investigación de IA
Recursos
Todos los recursos
Clientes
Blog
Eventos
La inferencia
Dentro del SOC
Glosario
Empresa
Acerca de nosotros
Contactar
Carreras
Liderazgo
Noticias
Federal
Academia
SDR Academy
Jurídico
Socios
Visión general
Portal de socios
Socios tecnológicos
Conviértase en socio
Integraciones
Microsoft
AWS
McLaren
Obtenga una demostración
Obtenga una demo
Get a demo
Darktrace Blog
Ransomware
Latest Blog Posts
Wide Scale Email Compromise Due to Mimecast Miss
Learn how a Mimecast misstep led to a large-scale email compromise and how DarkTrace AI detected the threat. Stay informed and protected against cyber threats.
Detecting OT Threats: ICS Attack at International Airport
Learn how Darktrace's OT Threat Detection technology identified a sophisticated ICS attack on an international airport. Read more on Darktrace's blog.
The Rise of Stealthy Malware in Public Organizations
Gain insights into how malware attempts to infiltrate public organizations to steal data and the defenses needed to combat these threats.
Darktrace Detects Malicious ISO Files with AI Darktrace Email
Darktrace AI detects malicious ISO file in email attack. Learn more about how Antigena Email stopped the attack without relying on signatures or blacklists.
Emotet Resurgence: Email & Network Defense Insights
Explore how Darktrace's defense in depth strategy combats Emotet's resurgence in email and network layers, ensuring robust cybersecurity.
Evil Corp's WastedLocker Ransomware Attacks Observation
Darktrace detects Evil Corp intrusions with WastedLocker ransomware. Learn how AI spotted malicious activity, from initial intrusion to data exfiltration.
How Off-the-Shelf Tools Are Used for Ransomware
Discover how off-the-shelf tools empower cyber-criminals. Explore a ransomware incident involving a low-skilled threat actor targeting a retail organization.
Darktrace Uncovers COVID-19 Relief Email Scam
Learn about Darktrace's findings on a COVID-19 relief email spoof and how to protect against similar phishing attacks.
Darktrace Email Finds: Fake ShareFile Notification
Stay safe from phishing by recognizing fake ShareFile alerts and compromised supplier accounts in your email.
Darktrace AI Detects Anomalous Behavior in Empty Office
AI uncovered hackers mining cryptocurrency on a biometric server in a deserted office during COVID-19. Learn how Darktrace detected this attack in real-time.
Ransomware-As-A-Service Threat: Eking Targets Government
Discover how Eking ransomware targeted a government organization in APAC. Learn about ransomware as a service & the cyber AI technology that stopped the threat.
Guarding Against Threats Beyond IT
We explore insights from a vast customer database, exposing the widespread adoption of ICS protocols within IT settings.
How to Prevent Spear Phishing Attacks Post Twitter Hack
Twitter confirmed spear phishing as the cause of last month's attack. Learn about the limits of current defenses against spear phishing and how AI can stop it.
Insider Threats: Microsoft 365 Account Hijack
Darktrace's Cyber AI Platform swiftly detects and alerts on anomalous behavior in Microsoft 365 accounts in real-time.
WeTransfer Impersonation Attacks Caught by Darktrace AI
Darktrace email finds two WeTransfer impersonation attacks caught by AI. Learn how Antigena Email detected and stopped malicious spoofing attempts effectively.
US Distributor Hit by LeChiffre Ransomware
Discover how LeChiffre ransomware targeted a US distributor and the measures taken to mitigate the attack, as reported by Darktrace.
How Darktrace Email Protects Against IT Impersonation
Protect your organization from email impersonation attacks. Learn how Darktrace's AI technology can detect phishing threats in real-time on our blog.
Resurgence of Ursnif Banking Trojan "May's Most Wanted Malware"
The Ursnif banking trojan tries to blend into the network as legitimate Zoom and Webex activity, trying to capture credentials. See how Darktrace stops it!
Industrial Sabotage Threats Uncovered
Protect your industrial systems from cyber threats with Darktrace's OT Threat Finder and learn how to prevent industrial sabotage.
Email Security: Darktrace's Approach to Safe New Contacts
Effective email security should provide full protection and keep business running smoothly. Learn about the security approach that Darktrace Email uses!
Previous
Next